JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)
        Home  |  About Journal  |  Editorial Board  |  Dynamic  |  Instruction  |  Subscribe  |  Advertisement  |  Contacts Us  |  中文
 
 
 
   In Press
   Current Issue
   Advanced Search
   Archive
   Read Articles
   Download Articles
Quick Search  
  Adv Search
 
2017 Vol. 52, No. 3
Published: 20 March 2017

 
 
1 Research on advertising auction model based on interest
DONG Hong-bin, GOU Nai-kang, YANG Xue
DOI: 10.6040/j.issn.1671-9352.4.2016.211
2017 Vol. 52 (3): 1-7 [Abstract] ( 12 ) HTML ( ) PDF (1785 KB)  ( 16 )
8 A new improvable quantum secret sharing scheme
XU Ting-ting, LI Zhi-hui, MA Min
DOI: 10.6040/j.issn.1671-9352.2.2016.026
2017 Vol. 52 (3): 8-15 [Abstract] ( 10 ) HTML ( ) PDF (773 KB)  ( 9 )
16 Survey on application of data mining via differential privacy
KANG Hai-yan, MA Yue-lei
DOI: 10.6040/j.issn.1671-9352.2.2016.053
2017 Vol. 52 (3): 16-23 [Abstract] ( 10 ) HTML ( ) PDF (932 KB)  ( 9 )
24 On the linear complexity of a new generalized cyclotomic sequence with length p3 over GF(l)
LIU Long-fei, YANG Xiao-yuan
DOI: 10.6040/j.issn.1671-9352.2.2016.108
2017 Vol. 52 (3): 24-31 [Abstract] ( 7 ) HTML ( ) PDF (779 KB)  ( 16 )
32 The inpainting of affine similarity damaged image based on structure automatic match
YU Wen-jing, BI Dong-xu, YAN Xue-feng
DOI: 10.6040/j.issn.1671-9352.0.2016.445
2017 Vol. 52 (3): 32-37 [Abstract] ( 10 ) HTML ( ) PDF (4230 KB)  ( 6 )
38 A study on security enhancement technology for KVM Hypervisor
ZHAO Dan-dan, CHEN Xing-shu, JIN Xin
DOI: 10.6040/j.issn.1671-9352.1.2016.083
2017 Vol. 52 (3): 38-43 [Abstract] ( 7 ) HTML ( ) PDF (1147 KB)  ( 9 )
44 Android application protection based on smali code obfuscation
LIU Fang-yuan, MENG Xian-jia, TANG Zhan-yong, FANG Ding-yi, GONG Xiao-qing
DOI: 10.6040/j.issn.1671-9352.2.2016.120
2017 Vol. 52 (3): 44-50 [Abstract] ( 8 ) HTML ( ) PDF (1512 KB)  ( 11 )
51 Mass diffusion on coupled social networks
DENG Xiao-fang, ZHONG Yuan-sheng, L(¨overU)Lin-yuan, WANG Ming-wen, XIONG Nai-xue
DOI: 10.6040/j.issn.1671-9352.0.2016.030
2017 Vol. 52 (3): 51-59 [Abstract] ( 8 ) HTML ( ) PDF (1751 KB)  ( 11 )
60 A software update mechanism for virtual machines in IaaS multi-tenant environment
CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long
DOI: 10.6040/j.issn.1671-9352.2.2016.105
2017 Vol. 52 (3): 60-67 [Abstract] ( 11 ) HTML ( ) PDF (3127 KB)  ( 8 )
68 A time-relevant network traffic anomaly detection approach
ZHUANG Zheng-mao, CHEN Xing-shu, SHAO Guo-lin, YE Xiao-ming
DOI: 10.6040/j.issn.1671-9352.1.2016.030
2017 Vol. 52 (3): 68-73 [Abstract] ( 13 ) HTML ( ) PDF (1368 KB)  ( 8 )
74 P2P botnet detection method based on fractal and adaptive data fusion
SONG Yuan-zhang, LI Hong-yu, CHEN Yuan, WANG Jun-jie
DOI: 10.6040/j.issn.1671-9352.2.2016.001
2017 Vol. 52 (3): 74-81 [Abstract] ( 11 ) HTML ( ) PDF (2113 KB)  ( 30 )
82 A packet loss concealment scheme based on HMM for mobile audio coding
XIANG Kai, CHEN Shi-hong
DOI: 10.6040/j.issn.1671-9352.2.2016.209
2017 Vol. 52 (3): 82-90 [Abstract] ( 10 ) HTML ( ) PDF (2110 KB)  ( 10 )
91 Cost-sensitive feature selection via manifold learning
HUANG Tian-yi, ZHU William
DOI: 10.6040/j.issn.1671-9352.4.2016.080
2017 Vol. 52 (3): 91-96 [Abstract] ( 16 ) HTML ( ) PDF (1542 KB)  ( 12 )
97 Graded multi-granulation rough set based on weighting granulations and dominance relation
WANG Xiao-yan, SHEN Jia-lan, SHEN Yuan-xia
DOI: 10.6040/j.issn.1671-9352.4.2016.159
2017 Vol. 52 (3): 97-104 [Abstract] ( 13 ) HTML ( ) PDF (772 KB)  ( 14 )
105 Three-way decisions model based on the optimal center covering algorithm
LIU Guo-tao, ZHANG Yan-ping, XU Chen-chu
DOI: 10.6040/j.issn.1671-9352.4.2016.216
2017 Vol. 52 (3): 105-110 [Abstract] ( 12 ) HTML ( ) PDF (1102 KB)  ( 13 )
山东大学学报(理学版)
 
More>>   
 
More>>   
More>>   
Copyright © Editorial Board of JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)
Supported by:Beijing Magtech